Red Hat 9042 Published by

An updated mysql-server package is available for Red Hat Enterprise Linux 3

----------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated mysql-server package
Advisory ID: RHSA-2004:611-01
Issue date: 2004-10-27
Updated on: 2004-10-27
Product: Red Hat Enterprise Linux LACD
Cross references: RHSA-2004:569
CVE Names: CAN-2004-0835 CAN-2004-0836 CAN-2004-0837 CAN-2004-0957
----------------------------------------------------------------------

1. Summary:

An updated mysql-server package that fixes various security issues is now available in the Red Hat Enterprise Linux 3 Extras channel of Red Hat Network.

2. Relevant releases/architectures:

Red Hat Enterprise Linux LACD 3AS - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux LACD 3Desktop - i386, x86_64
Red Hat Enterprise Linux LACD 3ES - i386, ia64, x86_64
Red Hat Enterprise Linux LACD 3WS - i386, ia64, x86_64



3. Problem description:

MySQL is a multi-user, multi-threaded SQL database server.

A number of security issues that affect the mysql-server package have been reported. Although Red Hat Enterprise Linux 3 does not ship with the mysql-server package, the affected package is available from the Red Hat Network Extras channel.

Oleksandr Byelkin discovered that "ALTER TABLE ... RENAME" checked the CREATE/INSERT rights of the old table instead of the new one. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0835 to this issue.

Lukasz Wojtow discovered a buffer overrun in the mysql_real_connect function. In order to exploit this issue an attacker would need to force the use of a malicious DNS server (CAN-2004-0836).

Dean Ellis discovered that multiple threads ALTERing the same (or different) MERGE tables to change the UNION could cause the server to crash or stall (CAN-2004-0837).

Sergei Golubchik discovered that if a user is granted privileges to a database with a name containing an underscore ("_"), the user also gains the ability to grant privileges to other databases with similar names (CAN-2004-0957).

Users of mysql-server should upgrade to these erratum packages, which correct these issues.

4. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs.

Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.m

5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):

135372 - CAN-2004-0835 MySQL flaws (CAN-2004-0836, CAN-2004-0837, CAN-2004-0957)

6. RPMs required:

Red Hat Enterprise Linux LACD 3AS:

i386:
87d3b9628b48bf11ba4c446f1eee2ea7 mysql-server-3.23.58-2.3.i386.rpm

ia64:
8e8ae3ba7b5ec198f59e5dace66b4bd0 mysql-server-3.23.58-2.3.ia64.rpm

ppc:
22c60b803409385945e43b254f18d066 mysql-server-3.23.58-2.3.ppc.rpm

s390:
24ef90f116cb8f7272c67b3c5ed3704a mysql-server-3.23.58-2.3.s390.rpm

s390x:
131e3e1b237e15141928385e96ab8aad mysql-server-3.23.58-2.3.s390x.rpm

x86_64:
b193c8e8d077a3fe10d20d090450d0db mysql-server-3.23.58-2.3.x86_64.rpm

Red Hat Enterprise Linux LACD 3Desktop:

i386:
87d3b9628b48bf11ba4c446f1eee2ea7 mysql-server-3.23.58-2.3.i386.rpm

x86_64:
b193c8e8d077a3fe10d20d090450d0db mysql-server-3.23.58-2.3.x86_64.rpm

Red Hat Enterprise Linux LACD 3ES:

i386:
87d3b9628b48bf11ba4c446f1eee2ea7 mysql-server-3.23.58-2.3.i386.rpm

ia64:
8e8ae3ba7b5ec198f59e5dace66b4bd0 mysql-server-3.23.58-2.3.ia64.rpm

x86_64:
b193c8e8d077a3fe10d20d090450d0db mysql-server-3.23.58-2.3.x86_64.rpm

Red Hat Enterprise Linux LACD 3WS:

i386:
87d3b9628b48bf11ba4c446f1eee2ea7 mysql-server-3.23.58-2.3.i386.rpm

ia64:
8e8ae3ba7b5ec198f59e5dace66b4bd0 mysql-server-3.23.58-2.3.ia64.rpm

x86_64:
b193c8e8d077a3fe10d20d090450d0db mysql-server-3.23.58-2.3.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key.html#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0835
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0836
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0837
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0957

8. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://www.redhat.com/security/team/contact.html

Copyright 2004 Red Hat, Inc.